mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-13 01:44:22 -05:00
913b09aeb8
* terraform: enable creation of SEV-SNP VMs on GCP * variant: add SEV-SNP attestation variant * config: add SEV-SNP config options for GCP * measurements: add GCP SEV-SNP measurements * gcp: separate package for SEV-ES * attestation: add GCP SEV-SNP attestation logic * gcp: factor out common logic * choose: add GCP SEV-SNP * cli: add TF variable passthrough for GCP SEV-SNP variables * cli: support GCP SEV-SNP for `constellation verify` * Adjust usage of GCP SEV-SNP throughout codebase * ci: add GCP SEV-SNP * terraform-provider: support GCP SEV-SNP * docs: add GCP SEV-SNP reference * linter fixes * gcp: only run test with TPM simulator * gcp: remove nonsense test * Update cli/internal/cmd/verify.go Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * Update docs/docs/overview/clouds.md Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * Update terraform-provider-constellation/internal/provider/attestation_data_source_test.go Co-authored-by: Adrian Stobbe <stobbe.adrian@gmail.com> * linter fixes * terraform_provider: correctly pass down CC technology * config: mark attestationconfigapi as unimplemented * gcp: fix comments and typos * snp: use nonce and PK hash in SNP report * snp: ensure we never use ARK supplied by Issuer (#3025) * Make sure SNP ARK is always loaded from config, or fetched from AMD KDS * GCP: Set validator `reportData` correctly --------- Signed-off-by: Daniel Weiße <dw@edgeless.systems> Co-authored-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * attestationconfigapi: add GCP to uploading * snp: use correct cert Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * terraform-provider: enable fetching of attestation config values for GCP SEV-SNP * linter fixes --------- Signed-off-by: Daniel Weiße <dw@edgeless.systems> Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> Co-authored-by: Adrian Stobbe <stobbe.adrian@gmail.com>
167 lines
4.6 KiB
HCL
167 lines
4.6 KiB
HCL
terraform {
|
|
required_providers {
|
|
google = {
|
|
source = "hashicorp/google"
|
|
version = "5.23.0"
|
|
}
|
|
|
|
google-beta = {
|
|
source = "hashicorp/google-beta"
|
|
version = "5.23.0"
|
|
}
|
|
|
|
random = {
|
|
source = "hashicorp/random"
|
|
version = "3.6.0"
|
|
}
|
|
}
|
|
}
|
|
|
|
locals {
|
|
group_uid = random_id.uid.hex
|
|
name = "${var.base_name}-${var.role}-${local.group_uid}"
|
|
state_disk_name = "state-disk"
|
|
}
|
|
|
|
resource "random_id" "uid" {
|
|
byte_length = 4
|
|
}
|
|
|
|
resource "google_compute_instance_template" "template" {
|
|
# Beta provider is necessary to set confidential instance types.
|
|
# TODO(msanft): Remove beta provider once confidential instance type setting is in GA.
|
|
provider = google-beta
|
|
|
|
name = local.name
|
|
machine_type = var.instance_type
|
|
tags = ["constellation-${var.uid}"] // Note that this is also applied as a label
|
|
labels = merge(var.labels, {
|
|
constellation-role = var.role,
|
|
constellation-node-group = var.node_group_name,
|
|
})
|
|
|
|
confidential_instance_config {
|
|
enable_confidential_compute = true
|
|
confidential_instance_type = var.cc_technology
|
|
}
|
|
|
|
# If SEV-SNP is used, we have to explicitly select a Milan processor, as per
|
|
# https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_instance_template#confidential_instance_type
|
|
min_cpu_platform = var.cc_technology == "SEV_SNP" ? "AMD Milan" : null
|
|
|
|
disk {
|
|
disk_size_gb = 10
|
|
source_image = var.image_id
|
|
auto_delete = true
|
|
boot = true
|
|
mode = "READ_WRITE"
|
|
}
|
|
|
|
disk {
|
|
disk_size_gb = var.disk_size
|
|
disk_type = var.disk_type
|
|
auto_delete = true
|
|
device_name = local.state_disk_name // This name is used by disk mapper to find the disk
|
|
boot = false
|
|
mode = "READ_WRITE"
|
|
type = "PERSISTENT"
|
|
}
|
|
|
|
metadata = {
|
|
kube-env = var.kube_env
|
|
constellation-init-secret-hash = var.init_secret_hash
|
|
serial-port-enable = var.debug ? "TRUE" : "FALSE"
|
|
}
|
|
|
|
network_interface {
|
|
network = var.network
|
|
subnetwork = var.subnetwork
|
|
alias_ip_range {
|
|
ip_cidr_range = "/24"
|
|
subnetwork_range_name = var.alias_ip_range_name
|
|
}
|
|
}
|
|
|
|
scheduling {
|
|
on_host_maintenance = "TERMINATE"
|
|
}
|
|
|
|
service_account {
|
|
scopes = [
|
|
"https://www.googleapis.com/auth/compute",
|
|
"https://www.googleapis.com/auth/servicecontrol",
|
|
"https://www.googleapis.com/auth/service.management.readonly",
|
|
"https://www.googleapis.com/auth/devstorage.read_only",
|
|
"https://www.googleapis.com/auth/logging.write",
|
|
"https://www.googleapis.com/auth/monitoring.write",
|
|
"https://www.googleapis.com/auth/trace.append",
|
|
"https://www.googleapis.com/auth/cloud-platform",
|
|
]
|
|
}
|
|
|
|
shielded_instance_config {
|
|
enable_secure_boot = false
|
|
enable_vtpm = true
|
|
enable_integrity_monitoring = true
|
|
}
|
|
|
|
lifecycle {
|
|
ignore_changes = [
|
|
name, # required. legacy instance templates used different naming scheme
|
|
tags,
|
|
labels,
|
|
disk, # required. update procedure modifies the instance template externally
|
|
metadata,
|
|
network_interface,
|
|
scheduling,
|
|
service_account,
|
|
shielded_instance_config,
|
|
]
|
|
}
|
|
}
|
|
|
|
resource "google_compute_instance_group_manager" "instance_group_manager" {
|
|
name = local.name
|
|
description = "Instance group manager for Constellation"
|
|
base_instance_name = local.name
|
|
zone = var.zone
|
|
target_size = var.initial_count
|
|
|
|
dynamic "stateful_disk" {
|
|
for_each = var.role == "control-plane" ? [1] : []
|
|
content {
|
|
device_name = local.state_disk_name
|
|
delete_rule = "ON_PERMANENT_INSTANCE_DELETION"
|
|
}
|
|
}
|
|
|
|
dynamic "stateful_internal_ip" {
|
|
for_each = var.role == "control-plane" ? [1] : []
|
|
content {
|
|
interface_name = "nic0"
|
|
delete_rule = "ON_PERMANENT_INSTANCE_DELETION"
|
|
}
|
|
}
|
|
|
|
version {
|
|
instance_template = google_compute_instance_template.template.id
|
|
}
|
|
|
|
dynamic "named_port" {
|
|
for_each = toset(var.named_ports)
|
|
content {
|
|
name = named_port.value.name
|
|
port = named_port.value.port
|
|
}
|
|
}
|
|
|
|
lifecycle {
|
|
ignore_changes = [
|
|
name, # required. legacy instance templates used different naming scheme
|
|
base_instance_name, # required. legacy instance templates used different naming scheme
|
|
target_size, # required. autoscaling modifies the instance count externally
|
|
version, # required. update procedure modifies the instance template externally
|
|
]
|
|
}
|
|
}
|